3. • No sales pitches
• “Tell Me Something New”
• No “We” or “I” – end user focus, not vendor
• Speaker evaluations very important
• Target: 50-60% highly-rated presentations
• Rate speakers based on how well they follow
presentation guidelines (available on website)
Speaker Guidelines/Evaluation
4. • Include Twitter hashtag #angelbeat in all Tweets
• Cell phones on vibrate
• Vendor discussions during break or outside
• Presentations downloadable
• Agenda will be followed to the minute
• Contact Angelbeat staff if you have any questions on
food, room temperature, room layout, audio-visual, etc.
Event Details
5. • Each vendor raffle must be entered separately
• All done at the end of day
• Must be present to win
• Each individual can win only twice
• Gift Cards and other great prizes
• All attendees receive $25 Amazon gift card from
Angelbeat, just stay til end of regular Microsoft talk
Raffle Prize Drawings
6. • Speakers receive attendee data post-seminar
• Contact Angelbeat to opt-out
• Reply back to post-event thank you email
• Whether you continue to opt-in or opt-out…
Please give sponsors fair consideration in future IT
spending decisions
Post Event Vendor Followup
7. • Follow us
• www.twitter.com/angelbeat
• www.youtube.com/angelbeat
• www.instagram.com/angelbeat
• www.facebook.com/angelbeat
• www.linkedin.com/groups/Angelbeat-
970047
Social Media #angelbeat
13. Continually Assess Risk of Every Endpoint
About Bradford Networks
Live Inventory of Network Connections
Appliance / Virtual / Cloud
Analytics & Forensics
Network Access Policy Engine
1,000+ Customers
5 Star Rating from SC Magazine
30+ Countries
Gartner MQ Visionary
Consistent Mission for 15 Years
14. Firewall VPN IDS/IPS SIEM RouterSwitch Wireless
Access
Point
Visibility Control
Leverages the Network Infrastructure
SNMP
CLI
SNMP
CLI
Radius
SNMP
Syslog
API
SNMP
Syslog
API
RadiusSNMP
Syslog
API
SNMP
CLI
Radius
25. 25 Proprietary and Confidential 2015
Market Drivers for SSL Security
Google, Apple, others pushing PFS
• SSL is no longer good enough.
• iOS9 mandates apps connect via
TLS with Perfect Forward
Secrecy.
26. 26 Proprietary and Confidential 2015
New SSL Requirements
SSL with and without Perfect Forward Secrecy
SSL SSL w/ PFS
27. 27 Proprietary and Confidential 2015
SSL Offload on Load Balancers
Hardware versus software, appliance versus fabric
Proprietary Hardware Appliance Software Defined Network
Custom ASIC X86 CPUs
Fixed capacity, forklift upgrade Instant elastic capacity
ASICs lag years behind tech Easy to be current
= Software load balancing fabric
28. 28 Proprietary and Confidential 2015
Load Balancer Implementation
The SDN Architecture
Internet
Data Center
Network
Appliance
SoftwareController
Management
SoftwareLoad Balancer
Data Plane
Software
29. 29 Proprietary and Confidential 2015
Legacy Hardware versus Avi Load Balancer
Easy to implement modern security immediately.
Legacy hardware load balancer
• Cavium SSLASICs for SSL offload
• ASICs do not support PFS and cannot be used
• SSL must be performed on underpowered CPUs
• $500k load balancer can do 48k SSL PFS TPS
SoftwareAvi
Vantage
Avi load balancer
• Intel CPU for SSL offload
• Infinitely scalable capacity
• $50k servers plus Avi can do 100k SSL PFSTPS
30. 30 Proprietary and Confidential 2015
Check out our booth for full Demonstrations
Self Service Provisioning Troubleshoot App Performance
o 30 Sec Load Balancer o App Health Score
o Scale Apps, not Complexity o One ClickTriage
o 100% REST Managed o Google-like Search vsTCPdump
Application Security VMware Integration
o Config Analyzer o vCenter Integration
o SSL Everywhere o Hybrid Cloud
o DDoS Attack Mitigation o Elastic Scale
Hinweis der Redaktion
13
How apps like Candy Crush are causing enterprises to move to modern architectures such as SDN.